YoVDO

Abnormal Behavior Detection in Large Environments

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Intrusion Detection Courses

Course Description

Overview

Explore abnormal behavior detection in large environments through this 50-minute conference talk from GrrCon 2016. Delve into defense strategies, attack patterns, and initial intrusion techniques. Learn about exploitation methods, including HTML attacks and PowerShell injection. Discover the use of invoke obfuscation, honey tokens, and Responder. Examine SCT files, persistence hooks, and service creations. Understand the importance of application whitelisting and various mitigation techniques. Gain insights into the concept of "Purple Time" and its relevance in cybersecurity.

Syllabus

Intro
Abnormal Behavior Detection
Defense
Understanding Attack Patterns
Initial Intrusion
Exploitation Methods
HTML Attack
PowerShell Injection
Invoke obfuscation
Honey tokens
Responder
SCT Files
Persistence hooks
Service creations
Application whitelisting
Mitigations
Purple Time


Related Courses

Network Security
Rochester Institute of Technology via edX
Network Security
Georgia Institute of Technology via Udacity
Real-Time Cyber Threat Detection and Mitigation
New York University (NYU) via Coursera
Information security - IV
Indian Institute of Technology Madras via Swayam
Cyber Security
CEC via Swayam